GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Computer security. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (335 pages)
    Edition: 1st ed.
    ISBN: 9789811910579
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.277
    DDC: 005.8
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Interactive multimedia -- Congresses. ; Multimedia systems -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (361 pages)
    Edition: 1st ed.
    ISBN: 9783642221583
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.11
    Language: English
    Note: Title Page -- Preface -- Organizations -- Contents -- Managing Collaborative Sessions in WSNs -- Introduction -- Related Work -- Collaboration Hierarchy in WSNs -- Types of Collaboration -- Collaboration Hierarchy -- Sessions -- WISE-MANager -- Case Study -- Advantages and Disadvantages -- Conclusions -- References -- OGRE-Coder: An Interoperable Environment for the Automatic Generation of OGRE Virtual Scenarios -- Introduction -- OGRE Markup Language (OGREML) -- OGRE-Coder: Design and Implementation Issues -- Requirements and Use Cases -- Architecture -- Implementation Tools -- OGRE-Coder Functionalities -- Authoring OGRE Virtual Environments -- Generating OGRE Code with OGRE-Coder -- Conclusions -- References -- Natural and Intuitive Video Mediated Collaboration -- Current Systems for Enabling Remote Collaboration -- Videoconferencing and Telepresence Systems -- Desktop Video Conferencing -- Interactive Tables and Smart Whiteboards -- The Importance of Usability -- Building Prototypes -- First Prototype -- Second Prototype -- Our Design Concept -- Permanent Connection, Invisible User Interface -- Natural Collaborative Tools -- Discussion -- Is Permanent Connection Too Limited? -- Where Could This Concept Be Applied? -- Challenges of Permanent Video Connections -- Future Development Challenges -- References -- Evolutionary System Supporting Music Composition -- Introduction -- Evolutionary System Supporting Music Composition -- Architecture of the System -- Genetic Algorithm -- The Process of Music Composition -- Experimental Results -- Summary and Conclusions -- References -- Usability Inspection of Informal Learning Environments: The HOU2LEARN Case -- Introduction -- Literature Review -- The HOU2LEARN Platform -- Usability Evaluation -- General -- The Method Applied -- The Experiment -- Conclusions - Future Goals -- References. , Procedural Modeling of Broad-Leaved Trees under Weather Conditions in 3D Virtual Reality -- Introduction -- Related Work -- Procedural Modeling of Broad-Leaved Trees -- Modeling of Tree under Weather Conditions -- Forest Modeling -- Experimental Program -- Conclusion -- References -- New Method for Adaptive Lossless Compression of Still Images Based on the Histogram Statistics -- Introduction -- Basic Principles of the АRL Coding Method -- Evaluation of the Lossless Coding Method Efficiency -- Experimental Results -- Conclusions -- References -- Scene Categorization with Class Extendibility and Effective Discriminative Ability -- Introduction -- Category-Specific Approach -- Whole-Construction/Whole-Representation Strategy -- Category-Specific-Construction/Whole-Representation Strategy -- Category-Specific-Construction/ Category-Specific-Representation Strategy -- Experimental Results -- Conclusions -- References -- Adaptive Navigation in a Web Educational System Using Fuzzy Techniques -- Introduction -- Adaptive Navigation Support -- The Domain Knowledge -- Student Modeling -- Discussion on the Fuzzy Cognitive Maps and Fuzzy User Modeling Used -- Conclusion -- References -- Visualization Tool for Scientific Gateway -- Introduction -- Visual Representation of Datasets -- VT as a New Discovery for Presenting Academic Research Results -- Architecture of Visualization Tool -- Directly Visual Education Form -- Conclusion -- References -- Digital Text Based Activity: Teaching Geometrical Entities at the Kindergarten -- Introduction -- Review Standards -- Method - Data Collection and Observations -- Digital Based Activities at the Kindergarten -- Using Graphical Programs (Mspaint) -- Using Slide Shows (PowerPoint) -- Using Digital Cameras -- Using Spreadsheets (EXCEL) -- Summary and Conclusions -- References. , Cross Format Embedding of Metadata in Images Using QR Codes -- Introduction -- QRCodes -- Our Proposal -- Results -- Applications -- Conclusions -- References -- An Empirical Study for Integrating Personality Characteristics in Stereotype-Based Student Modelling in a Collaborative Learning Environment for UML -- Introduction -- Personality Related Stereotypes -- Empirical Study for Defining the Triggers -- Implementation of Triggers -- Conclusion -- References -- An Efficient Parallel Architecture for H.264/AVC Fractional Motion Estimation -- Introduction -- H.264/AVC FME Observations -- Encoding with INTER8x8 Mode or above -- Statistic Charactistics of Motion Vectors -- The Proposed Architecture -- Reference Pixel Array -- Integer Pixel Sampler in Reference Array -- 14-Input FME Engine -- Data Processing Order -- 3-Stages Processing -- Simulation Results -- Conclusions -- References -- Fast Two-Stage Global Motion Estimation: A Blocks and Pixels Sampling Approach -- Introduction -- Motion Models -- Global Motion Estimation -- Initial Translation Estimation -- Block Sampling and Limited Block Matching -- Initial Estimation of Perspective Model GM Parameters -- Subsampling Pixels and Levenberg-Marquardt Algorithm -- Simulation -- Conclusion -- References -- Frame Extraction Based on Displacement Amount for Automatic Comic Generation from Metaverse Museum Visit Log -- Introduction -- Comic Generation System -- Evaluation -- Implementation -- Evaluation Outline -- Results and Discussions -- Related Work -- Conclusions and Future Work -- References -- Knowledge-Based Authoring Tool for Tutoring Multiple Languages -- Introduction -- Related Work -- Architecture of Our System -- Description of the System -- Authoring Domain Knowledge -- Authoring Student Model -- Authoring of Teaching Model -- Case Study for the Instructor -- Case Study for the Student. , Student Modeling and Error Diagnosis -- Modeling the System's Authoring Process -- Conclusions -- References -- Evaluating an Affective e-Learning System Using a Fuzzy Decision Making Method -- Introduction -- Fuzzy Simple Additive Weighting -- Overall Description of the System -- Evaluation Experiment -- Results -- Conclusions -- References -- Performance Evaluation of Adaptive Content Selection in AEHS -- Introduction -- Performance Evaluation Metrics for Decision-Based AEHS -- Evaluation Methodology for Decision-Based AEHS -- Setting Up the Experiments -- Designing the Media Space -- Designing the Learner Model -- Simulating the AM of an AEHS -- Experimental Results and Discussion -- Extracting the AM of existing AEHS -- Scaling Up the Experiments -- Conclusions -- References -- AFOL: Towards a New Intelligent Interactive Programming Language for Children -- Introduction -- General Architecture of the AFOL Programming Environment -- Overview of the AFOL Programming Learning System -- AFOL Language Commands and Object Oriented Structure -- Conclusions -- References -- Multimedia Session Reconfiguration for Mobility-Aware QoS Management: Use Cases and the Functional Model -- Introduction -- Session Reconfiguration and Use Cases -- Functional Model -- Performance Evaluation -- Conclusions and Future Work -- References -- LSB Steganographic Detection Using Compressive Sensing -- Introduction -- Steganalysis -- Compressive Sensing and BM3D -- The Proposed Method -- Results -- Conclusions -- References -- Analysis of Histogram Descriptor for Image Retrieval in DCT Domain -- Introduction -- Description of the Method -- Pre-processing -- Construction of the AC-Pattern Histogram -- Construction of DC-Pattern Histogram -- Application to Image Retrieval -- Paramaters of Descriptor -- Performance Analysis -- Application to GTF Database. , Application to ORL Database -- Conclusions -- References -- A Representation Model of Images Based on Graphs and Automatic Instantiation of Its Skeletal Configuration -- Introduction -- Related Works -- A Model for Images -- Instantiating the Model -- Experiments -- Conclusion and Outlook -- References -- Advice Extraction fromWeb for Providing Prior Information Concerning Outdoor Activities -- Introduction -- Characteristics Analysis of Advices -- The Definition of Advices -- Construction of Development Data -- Characteristics of Advices -- Characteristics of Advices Suitable for Situations -- Prior Advice Acquisition -- Preprocessing -- Advice Acquisition -- Situation Classification of Advices -- Experiment -- Evaluation Data -- Experiment for Acquiring Advices -- Experiment for Classifying Situation of Advices -- Conclusion -- References -- Automatic Composition of Presentation Slides, Based on Semantic Relationships among Slide Components -- Introduction -- Approach -- Document Structure -- Processing Flow -- Slide Editing -- Semantic Relationship -- Editing Operation -- Slide Composition -- Grouping of Slide Components -- Template-Based Slide Composition -- Prototype System -- Component Editing Interface -- Display Interface -- Conclusion -- References -- Sustainable Obsolescence Management - A Conceptual Unified Framework to Form Basis of an Interactive Intelligent Multimedia System -- Introduction -- Definitions -- Sustainability / Sustainable Development -- Obsolescence -- Sustainability versus Obsolescence - Built Environment Context -- Social -- Environmental -- Economic -- Holistic Sustainable Obsolescence Management -- Obsolescence Assessment (OA) -- Obsolescence Reduction (OR) -- Concluding Remarks -- References -- Automatic Text Formatting for Social Media Based on Linefeed and Comma Insertion -- Introduction. , Text Formatting by Comma and Linefeed Insertion.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Artificial intelligence-Mathematical models. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (241 pages)
    Edition: 1st ed.
    ISBN: 9783030805715
    Series Statement: Learning and Analytics in Intelligent Systems Series ; v.22
    DDC: 006.3
    Language: English
    Note: Intro -- Foreword -- Preface -- Contents -- 1 Introduction to Advances in Artificial Intelligence-Based Technologies -- References -- Part I Advances in Artificial Intelligence Tools and Methodologies -- 2 Synthesizing 2D Ground Images for Maps Creation and Detecting Texture Patterns -- 2.1 Introduction -- 2.2 Synthesizing 2D Consecutive Region-Images for Space Map Generation -- 2.3 Texture Paths Detection -- 2.4 Simulated Case Study and Comparison with Other Methods -- 2.5 Discussion -- References -- 3 Affective Computing: An Introduction to the Detection, Measurement, and Current Applications -- 3.1 Introduction -- 3.2 Background -- 3.3 Detection and Measurement Devices for Affective Computing -- 3.3.1 Brain Computer Interfaces (BCIs) -- 3.3.2 Facial Expression and Eye Tracking Technologies -- 3.3.3 Galvanic Skin Response -- 3.3.4 Multimodal Input Devices -- 3.3.5 Emotional Speech Recognition and Natural Language Processing -- 3.4 Application Examples -- 3.4.1 Entertainment -- 3.4.2 Chatbots -- 3.4.3 Medical Applications -- 3.5 Conclusions -- References -- 4 A Database Reconstruction Approach for the Inverse Frequent Itemset Mining Problem -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Problem Definition -- 4.3.1 Frequent Itemset Hiding Problem -- 4.3.2 Inverse Frequent Itemset Hiding Problem -- 4.4 Hiding Approach -- 4.5 Conclusion and Future Steps -- References -- 5 A Rough Inference Software System for Computer-Assisted Reasoning -- 5.1 Introduction -- 5.2 Basic Concepts -- 5.2.1 Rough Sets -- 5.2.2 Information System -- 5.2.3 Decision System -- 5.2.4 Indiscernibility Relation -- 5.3 The Approximate Algorithms for Information Systems -- 5.3.1 The Approximate Algorithm for Attribute Reduction -- 5.3.2 The Algorithm for Approximate Rule Generation -- 5.4 Implementation of the Rough Inference System. , 5.5 An Application in Electrical Engineering-A Case Study -- 5.6 Conclusions -- References -- Part II Advances in Artificial Intelligence-based Applications and Services -- 6 Context Representation and Reasoning in Robotics-An Overview -- 6.1 Introduction -- 6.2 Context -- 6.2.1 Definitions of Context -- 6.2.2 Context Aware Systems -- 6.2.3 Context Representation -- 6.3 Context Reasoning -- 6.3.1 Reasoning Approaches and Techniques -- 6.3.2 Reasoning Tools -- 6.4 Conclusions and Future Work -- References -- 7 Smart Tourism and Artificial Intelligence: Paving the Way to the Post-COVID-19 Era -- 7.1 Introduction -- 7.2 Methodology and Research Approach -- 7.3 Artificial Intelligence and Smart Tourism -- 7.3.1 Artificial Intelligence -- 7.3.2 AI Smart Tourism Recommender Systems -- 7.3.3 Deep Learning -- 7.3.4 Augmented Reality In tourism -- 7.3.5 AI Autonomous Agents -- 7.4 Smart Tourism in COVID-19 Pandemic -- 7.5 Conclusions and Future Directions -- References -- 8 Challenges and AI-Based Solutions for Smart Energy Consumption in Smart Cities -- 8.1 Introduction -- 8.2 Smart Energy in Smart Cities -- 8.3 Energy Consumption Challenges and AI Solutions -- 8.3.1 End-User Consumers in Smart Cities -- 8.3.2 Demand Forecasting -- 8.3.3 Prosumers Management -- 8.3.4 Consumption Privacy -- 8.4 Discussion -- References -- 9 How to Make Different Thinking Profiles Visible Through Technology: The Potential for Log File Analysis and Learning Analytics -- 9.1 Introduction -- 9.2 The Development of Log File Analysis and Learning Analytics -- 9.3 Analysing Log File Data in Researching Dynamic Problem-Solving -- 9.4 Extracting, Structuring and Analysing Log File Data to Make Different Thinking Profiles Visible -- 9.4.1 Aims -- 9.4.2 Methods -- 9.5 Participants -- 9.6 Instruments -- 9.7 Procedures -- 9.8 Results -- 9.9 Discussion -- 9.10 Conclusions and Limitations. , References -- 10 AI in Consumer Behavior -- 10.1 Introduction -- 10.2 Literature Review -- 10.3 Artificial Intelligence (AI) in Consumer Behavior -- 10.3.1 Artificial Intelligence -- 10.3.2 Consumer Behavior -- 10.3.3 AI in Consumer Behavior -- 10.3.4 AI and Ethics -- 10.4 Conclusion -- References -- Part III Theoretical Advances in Computation and System Modeling -- 11 Coupled Oscillator Networks for von Neumann and Non-von Neumann Computing -- 11.1 Introduction -- 11.2 Basic Unit, Network Architecture and Computational Principle -- 11.3 Nonlinear Oscillator Networks and Phase Equation -- 11.3.1 Example -- 11.4 Oscillator Networks for Boolean Logic -- 11.4.1 Registers -- 11.4.2 Logic Gates -- 11.5 Conclusions -- References -- 12 Design and Implementation in a New Approach of Non-minimal State Space Representation of a MIMO Model Predictive Control Strategy-Case Study and Performance Analysis -- 12.1 Introduction -- 12.2 Centrifugal Chiller-System Decomposition -- 12.2.1 Centrifugal Chiller Dynamic Model Description -- 12.2.2 Centrifugal Chiller Dynamic MIMO ARMAX Model Description -- 12.2.3 Centrifugal Chiller Open Loop MIMO ARMAX Discrete-Time Model -- 12.2.4 Centrifugal Chiller Dynamic MIMO ARMAX Model Nonminimal State Space Description -- 12.3 MISO MPC Strategy Design in a Minimal State Space Realization -- 12.3.1 MIMO MPC Optimization Problem Formulation -- 12.3.2 MIMO MPC Parameters Design -- 12.3.3 MIMO MPC MATLAB SIMULINK Simulation Results -- 12.4 MIMO MPC Strategy Design in a Nonminimal State Space Realization -- 12.5 Conclusions -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Machine learning. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (237 pages)
    Edition: 1st ed.
    ISBN: 9783030767945
    Series Statement: Learning and Analytics in Intelligent Systems Series ; v.23
    DDC: 006.31
    Language: English
    Note: Intro -- Foreword -- Further Reading -- Preface -- Contents -- 1 Introduction to Advances in Machine Learning/Deep Learning-Based Technologies -- 1.1 Editorial Note -- 1.2 Book Summary and Future Volumes -- References -- Part I Machine Learning/Deep Learning in Socializing and Entertainment -- 2 Semi-supervised Feature Selection Method for Fuzzy Clustering of Emotional States from Social Streams Messages -- 2.1 Introduction -- 2.2 The FS-EFCM Algorithm -- 2.2.1 EFCM Execution: Main Steps -- 2.2.2 Initial Parameter Setting -- 2.3 Experimental Results -- 2.3.1 Dataset -- 2.3.2 Feature Selection -- 2.3.3 FS-EFCM at Work -- 2.4 Conclusion -- References -- 3 AI in (and for) Games -- 3.1 Introduction -- 3.2 Game Content and Databases -- 3.3 Intelligent Game Content Generation and Selection -- 3.3.1 Generating Content for a Language Education Game -- 3.4 Conclusions -- References -- Part II Machine Learning/Deep Learning in Education -- 4 Computer-Human Mutual Training in a Virtual Laboratory Environment -- 4.1 Introduction -- 4.1.1 Purpose and Development of the Virtual Lab -- 4.1.2 Different Playing Modes -- 4.1.3 Evaluation -- 4.2 Background and Related Work -- 4.3 Architecture of the Virtual Laboratory -- 4.3.1 Conceptual Design -- 4.3.2 State-Transition Diagrams -- 4.3.3 High Level Design -- 4.3.4 State Machine -- 4.3.5 Individual Scores -- 4.3.6 Quantization -- 4.3.7 Normalization -- 4.3.8 Composite Evaluation -- 4.3.9 Success Rate -- 4.3.10 Weighted Average -- 4.3.11 Artificial Neural Network -- 4.3.12 Penalty Points -- 4.3.13 Aggregate Score -- 4.4 Machine Learning Algorithms -- 4.4.1 Genetic Algorithm for the Weighted Average -- 4.4.2 Training the Artificial Neural Network with Back-Propagation -- 4.5 Implementation -- 4.5.1 Instruction Mode -- 4.5.2 Evaluation Mode -- 4.5.3 Computer Training Mode -- 4.5.4 Training Data Collection Sub-mode. , 4.5.5 Machine Learning Sub-mode -- 4.6 Training-Testing Process and Results -- 4.6.1 Training Data -- 4.6.2 Training and Testing on Various Data Set Groups -- 4.6.3 Genetic Algorithm Results -- 4.6.4 Artificial Neural Network Training Results -- 4.7 Conclusions -- References -- 5 Exploiting Semi-supervised Learning in the Education Field: A Critical Survey -- 5.1 Introduction -- 5.2 Semi-supervised Learning -- 5.3 Literature Review -- 5.3.1 Performance Prediction -- 5.3.2 Dropout Prediction -- 5.3.3 Grade Level Prediction -- 5.3.4 Grade Point Value Prediction -- 5.3.5 Other Studies -- 5.3.6 Discussion -- 5.4 The Potential of SSL in the Education Field -- 5.5 Conclusions -- References -- Part III Machine Learning/Deep Learning in Security -- 6 Survey of Machine Learning Approaches in Radiation Data Analytics Pertained to Nuclear Security -- 6.1 Introduction -- 6.2 Machine Learning Methodologies in Nuclear Security -- 6.2.1 Nuclear Signature Identification -- 6.2.2 Background Radiation Estimation -- 6.2.3 Radiation Sensor Placement -- 6.2.4 Source Localization -- 6.2.5 Anomaly Detection -- 6.3 Conclusion -- References -- 7 AI for Cybersecurity: ML-Based Techniques for Intrusion Detection Systems -- 7.1 Introduction -- 7.1.1 Why Does AI Pose Great Importance for Cybersecurity? -- 7.1.2 Contribution -- 7.2 ML-Based Models for Cybersecurity -- 7.2.1 K-Means -- 7.2.2 Autoencoder (AE) -- 7.2.3 Generative Adversarial Network (GAN) -- 7.2.4 Self Organizing Map -- 7.2.5 K-Nearest Neighbors (k-NN) -- 7.2.6 Bayesian Network -- 7.2.7 Decision Tree -- 7.2.8 Fuzzy Logic (Fuzzy Set Theory) -- 7.2.9 Multilayer Perceptron (MLP) -- 7.2.10 Support Vector Machine (SVM) -- 7.2.11 Ensemble Methods -- 7.2.12 Evolutionary Algorithms -- 7.2.13 Convolutional Neural Networks (CNN) -- 7.2.14 Recurrent Neural Network (RNN) -- 7.2.15 Long Short Term Memory (LSTM). , 7.2.16 Restricted Boltzmann Machine (RBM) -- 7.2.17 Deep Belief Network (DBN) -- 7.2.18 Reinforcement Learning (RL) -- 7.3 Open Topics and Potential Directions -- 7.3.1 Novel Feature Representations -- 7.3.2 Unsupervised Learning Based Detection Systems -- References -- Part IV Machine Learning/Deep Learning in Time Series Forecasting -- 8 A Comparison of Contemporary Methods on Univariate Time Series Forecasting -- 8.1 Introduction -- 8.2 Related Work -- 8.3 Theoretical Background -- 8.3.1 ARIMA -- 8.3.2 Prophet -- 8.3.3 The Holt-Winters Seasonal Models -- 8.3.4 N-BEATS: Neural Basis Expansion Analysis -- 8.3.5 DeepAR -- 8.3.6 Trigonometric BATS -- 8.4 Experiments and Results -- 8.4.1 Datasets -- 8.4.2 Algorithms -- 8.4.3 Evaluation -- 8.4.4 Results -- 8.5 Conclusions -- References -- 9 Application of Deep Learning in Recurrence Plots for Multivariate Nonlinear Time Series Forecasting -- 9.1 Introduction -- 9.2 Related Work -- 9.2.1 Background on Recurrence Plots -- 9.2.2 Time Series Imaging and Convolutional Neural Networks -- 9.3 Time Series Nonlinearity -- 9.4 Time Series Imaging -- 9.4.1 Dimensionality Reduction -- 9.4.2 Optimal Parameters -- 9.5 Convolutional Neural Networks -- 9.6 Model Pipeline and Architecture -- 9.6.1 Architecture -- 9.7 Experimental Setup -- 9.8 Results -- 9.9 Conclusion -- References -- Part V Machine Learning in Video Coding and Information Extraction -- 10 A Formal and Statistical AI Tool for Complex Human Activity Recognition -- 10.1 Introduction -- 10.2 The Hybrid Framework-Formal Languages -- 10.3 Formal Tool and Statistical Pipeline Architecture -- 10.4 DATA Pipeline -- 10.5 Tools for Implementation -- 10.6 Experimentation with Datasets to Identify the Ideal Model -- 10.6.1 KINISIS-Single Human Activity Recognition Modeling -- 10.6.2 DRASIS-Change of Human Activity Recognition Modeling -- 10.7 Conclusions. , References -- 11 A CU Depth Prediction Model Based on Pre-trained Convolutional Neural Network for HEVC Intra Encoding Complexity Reduction -- 11.1 Introduction -- 11.2 H.265 High Efficiency Video Coding -- 11.2.1 Coding Tree Unit Partition -- 11.2.2 Rate Distortion Optimization -- 11.2.3 CU Partition and Image Texture Features -- 11.3 Proposed Methodology -- 11.3.1 The Hierarchical Classifier -- 11.3.2 The Methodology of Transfer Learning -- 11.3.3 Structure of Convolutional Neural Network -- 11.3.4 Dataset Construction -- 11.4 Experiments and Results -- 11.5 Conclusion -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (336 pages)
    Edition: 1st ed.
    ISBN: 9783319471945
    Series Statement: Intelligent Systems Reference Library ; v.118
    Language: English
    Note: Intro -- Foreword -- Preface -- Acknowledgments -- Contents -- Part I Machine Learning Fundamentals -- 1 Introduction -- References -- 2 Machine Learning -- 2.1 Introduction -- 2.2 Machine Learning Categorization According to the Type of Inference -- 2.2.1 Model Identification -- 2.2.2 Shortcoming of the Model Identification Approach -- 2.2.3 Model Prediction -- 2.3 Machine Learning Categorization According to the Amount of Inference -- 2.3.1 Rote Learning -- 2.3.2 Learning from Instruction -- 2.3.3 Learning by Analogy -- 2.4 Learning from Examples -- 2.4.1 The Problem of Minimizing the Risk Functional from Empirical Data -- 2.4.2 Induction Principles for Minimizing the Risk Functional on Empirical Data -- 2.4.3 Supervised Learning -- 2.4.4 Unsupervised Learning -- 2.4.5 Reinforcement Learning -- 2.5 Theoretical Justifications of Statistical Learning Theory -- 2.5.1 Generalization and Consistency -- 2.5.2 Bias-Variance and Estimation-Approximation Trade-Off -- 2.5.3 Consistency of Empirical Minimization Process -- 2.5.4 Uniform Convergence -- 2.5.5 Capacity Concepts and Generalization Bounds -- 2.5.6 Generalization Bounds -- References -- 3 The Class Imbalance Problem -- 3.1 Nature of the Class Imbalance Problem -- 3.2 The Effect of Class Imbalance on Standard Classifiers -- 3.2.1 Cost Insensitive Bayes Classifier -- 3.2.2 Bayes Classifier Versus Majority Classifier -- 3.2.3 Cost Sensitive Bayes Classifier -- 3.2.4 Nearest Neighbor Classifier -- 3.2.5 Decision Trees -- 3.2.6 Neural Networks -- 3.2.7 Support Vector Machines -- References -- 4 Addressing the Class Imbalance Problem -- 4.1 Resampling Techniques -- 4.1.1 Natural Resampling -- 4.1.2 Random Over-Sampling and Random Under-Sampling -- 4.1.3 Under-Sampling Methods -- 4.1.4 Over-Sampling Methods -- 4.1.5 Combination Methods -- 4.2 Cost Sensitive Learning -- 4.2.1 The MetaCost Algorithm. , 4.3 One Class Learning -- 4.3.1 One Class Classifiers -- 4.3.2 Density Models -- 4.3.3 Boundary Methods -- 4.3.4 Reconstruction Methods -- 4.3.5 Principal Components Analysis -- 4.3.6 Auto-Encoders and Diabolo Networks -- References -- 5 Machine Learning Paradigms -- 5.1 Support Vector Machines -- 5.1.1 Hard Margin Support Vector Machines -- 5.1.2 Soft Margin Support Vector Machines -- 5.2 One-Class Support Vector Machines -- 5.2.1 Spherical Data Description -- 5.2.2 Flexible Descriptors -- 5.2.3 v - SVC -- References -- Part II Artificial Immune Systems -- 6 Immune System Fundamentals -- 6.1 Introduction -- 6.2 Brief History and Perspectives on Immunology -- 6.3 Fundamentals and Main Components -- 6.4 Adaptive Immune System -- 6.5 Computational Aspects of Adaptive Immune System -- 6.5.1 Pattern Recognition -- 6.5.2 Immune Network Theory -- 6.5.3 The Clonal Selection Principle -- 6.5.4 Immune Learning and Memory -- 6.5.5 Immunological Memory as a Sparse Distributed Memory -- 6.5.6 Affinity Maturation -- 6.5.7 Self/Non-self Discrimination -- References -- 7 Artificial Immune Systems -- 7.1 Definitions -- 7.2 Scope of AIS -- 7.3 A Framework for Engineering AIS -- 7.3.1 Shape-Spaces -- 7.3.2 Affinity Measures -- 7.3.3 Immune Algorithms -- 7.4 Theoretical Justification of the Machine Learning -- 7.5 AIS-Based Clustering -- 7.5.1 Background Immunological Concepts -- 7.5.2 The Artificial Immune Network (AIN) Learning Algorithm -- 7.5.3 AiNet Characterization and Complexity Analysis -- 7.6 AIS-Based Classification -- 7.6.1 Background Immunological Concepts -- 7.6.2 The Artificial Immune Recognition System (AIRS) Learning Algorithm -- 7.6.3 Source Power of AIRS Learning Algorithm and Complexity Analysis -- 7.7 AIS-Based Negative Selection -- 7.7.1 Background Immunological Concepts -- 7.7.2 Theoretical Justification of the Negative Selection Algorithm. , 7.7.3 Real-Valued Negative Selection with Variable-Sized Detectors -- 7.7.4 AIS-Based One-Class Classification -- 7.7.5 V-Detector Algorithm -- References -- 8 Experimental Evaluation of Artificial Immune System-Based Learning Algorithms -- 8.1 Experimentation -- 8.1.1 The Test Data Set -- 8.1.2 Artificial Immune System-Based Music Piece Clustering and Database Organization -- 8.1.3 Artificial Immune System-Based Customer Data Clustering in an e-Shopping Application -- 8.1.4 AIS-Based Music Genre Classification -- 8.1.5 Music Recommendation Based on Artificial Immune Systems -- References -- 9 Conclusions and Future Work.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Machine learning. ; Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (429 pages)
    Edition: 1st ed.
    ISBN: 9783030497248
    Series Statement: Learning and Analytics in Intelligent Systems Series ; v.18
    Language: English
    Note: Intro -- Foreword -- Preface -- Contents -- 1 Machine Learning Paradigms: Introduction to Deep Learning-Based Technological Applications -- 1.1 Editorial Note -- References -- Part IDeep Learning in Sensing -- 2 Vision to Language: Methods, Metrics and Datasets -- 2.1 Introduction -- 2.2 Challenges in Image Captioning -- 2.2.1 Understanding and Predicting `Importance' in Images -- 2.2.2 Visual Correctness of Words -- 2.2.3 Automatic Evaluation Metrics -- 2.2.4 Image Specificity -- 2.2.5 Natural-Sounding Descriptions -- 2.3 Image Captioning Models and Their Taxonomy -- 2.3.1 Example Lookup-Based Models -- 2.3.2 Generation-based Models -- 2.4 Assessment of Image Captioning Models -- 2.4.1 Human Evaluation -- 2.4.2 Automatic Evaluation Metrics -- 2.4.3 Distraction Task(s) Based Methods -- 2.5 Datasets for Image Captioning -- 2.5.1 Generic Captioning Datasets -- 2.5.2 Stylised Captioning Datasets -- 2.5.3 Domain Specific Captioning Datasets -- 2.6 Applications of Visual Captioning -- 2.6.1 Medical Image Captioning -- 2.6.2 Life-Logging -- 2.6.3 Commentary for Sports' Videos -- 2.6.4 Captioning for Newspapers -- 2.6.5 Captioning for Assistive Technology -- 2.6.6 Other Applications -- 2.7 Extensions of Image Captioning to Other Vision-to-Language Tasks -- 2.7.1 Visual Question Answering -- 2.7.2 Visual Storytelling -- 2.7.3 Video Captioning -- 2.7.4 Visual Dialogue -- 2.7.5 Visual Grounding -- 2.8 Conclusion and Future Works -- References -- 3 Deep Learning Techniques for Geospatial Data Analysis -- 3.1 Introduction -- 3.2 Deep Learning: A Brief Overview -- 3.2.1 Deep Learning Architectures -- 3.2.2 Deep Neural Networks -- 3.2.3 Convolutional Neural Network (CNN) -- 3.2.4 Recurrent Neural Networks (RNN) -- 3.2.5 Auto-Encoders (AE) -- 3.3 Geospatial Analysis: A Data Science Perspective -- 3.3.1 Enabling Technologies for Geospatial Data Collection. , 3.3.2 Geospatial Data Models -- 3.3.3 Geospatial Data Management -- 3.4 Deep Learning for Remotely Sensed Data Analytics -- 3.4.1 Data Pre-processing -- 3.4.2 Feature Engineering -- 3.4.3 Geospatial Object Detection -- 3.4.4 Classification Tasks in Geospatial Analysis -- 3.5 Deep Learning for GPS Data Analytics -- 3.6 Deep Learning for RFID Data Analytics -- 3.7 Conclusion -- References -- 4 Deep Learning Approaches in Food Recognition -- 4.1 Introduction -- 4.2 Background -- 4.2.1 Popular Deep Learning Frameworks -- 4.3 Deep Learning Methods for Food Recognition -- 4.3.1 Food Image Datasets -- 4.3.2 Approach #1: New Architecture Development -- 4.3.3 Approach #2: Transfer Learning and Fine-Tuning -- 4.3.4 Approach #3: Deep Learning Platforms -- 4.4 Comparative Study -- 4.4.1 New Architecture Against Pre-trained Models -- 4.4.2 Deep Learning Platforms Against Each Other -- 4.5 Conclusions -- References -- Part IIDeep Learning in Social Media and IOT -- 5 Deep Learning for Twitter Sentiment Analysis: The Effect of Pre-trained Word Embedding -- 5.1 Introduction -- 5.2 Related Work -- 5.3 Evaluation Procedure -- 5.3.1 Datasets -- 5.3.2 Data Preprocessing -- 5.3.3 Pre-trained Word Embeddings -- 5.3.4 Deep Learning -- 5.4 Comparative Analysis and Discussion -- 5.5 Conclusion and Future Work -- References -- 6 A Good Defense Is a Strong DNN: Defending the IoT with Deep Neural Networks -- 6.1 Introduction -- 6.2 State of the Art in IoT Cyber Security -- 6.3 A Cause for Concern: IoT Cyber Security -- 6.3.1 Introduction to IoT Cyber Security -- 6.3.2 IoT Malware -- 6.4 Background of Machine Learning -- 6.4.1 Support Vector Machine (SVM) -- 6.4.2 Random Forest -- 6.4.3 Deep Neural Network (DNN) -- 6.5 Experiment -- 6.5.1 Training and Test Data -- 6.5.2 Baselines of the Machine Learning Models -- 6.6 Results and Discussion -- 6.6.1 Results -- 6.6.2 Discussion. , 6.7 Conclusion -- References -- Part IIIDeep Learning in the Medical Field -- 7 Survey on Deep Learning Techniques for Medical Imaging Application Area -- 7.1 Introduction -- 7.2 From Machine Learning to Deep Learning -- 7.3 Learning Algorithm -- 7.4 ANN -- 7.4.1 Activation Function in ANN -- 7.4.2 Training Process -- 7.5 DNN -- 7.5.1 Supervised Deep Learning -- 7.5.2 Unsupervised Learning -- 7.6 MRI Preprocessing -- 7.6.1 Inter-series Sorting -- 7.6.2 Registration -- 7.6.3 Normalization -- 7.6.4 Correction of the Bias Field -- 7.7 Deep Learning Applications in Medical Imagining -- 7.7.1 Classification -- 7.7.2 Detection -- 7.7.3 Segmentation -- 7.7.4 Registration -- 7.8 Conclusion -- References -- 8 Deep Learning Methods in Electroencephalography -- 8.1 Introduction -- 8.1.1 A Short Introduction to EEG -- 8.2 Literature Review -- 8.2.1 Public Datasets -- 8.2.2 Preprocessing Methods -- 8.2.3 Input Representation -- 8.2.4 Data Augmentation -- 8.2.5 Architectures -- 8.2.6 Features Visualization -- 8.2.7 Applications -- 8.3 Practical Example-Eriksen Flanker Task -- 8.3.1 Materials -- 8.4 Summary -- References -- Part IVDeep Learning in Systems Control -- 9 The Implementation and the Design of a Hybriddigital PI Control Strategy Based on MISO Adaptive Neural Network Fuzzy Inference System Models-A MIMO Centrifugal Chiller Case Study -- 9.1 Introduction -- 9.2 Centrifugal Chiller System Decomposition-Closed-Loop Simulations -- 9.3 MISO ARMAX and ANFIS Models of MIMO Centrifugal Chiller Plant -- 9.3.1 MISO ARMAX and ANFIS Evaporator Subsystem Models -- 9.3.2 MISO ARMAX and ANFIS Condenser Subsystem Models -- 9.4 Centrifugal Chiller PID Closed-Loop Control Strategies-Performance Analysis -- 9.5 Conclusions -- References -- 10 A Review of Deep Reinforcement Learning Algorithms and Comparative Results on Inverted Pendulum System -- 10.1 Introduction. , 10.2 Reinforcement Learning Background -- 10.2.1 Markov Decision Process -- 10.2.2 Deep-Q Learning -- 10.2.3 Double Deep-Q Learning -- 10.2.4 Double Dueling Deep-Q Learning -- 10.2.5 Reinforce -- 10.2.6 Asynchronous Deep Reinforcement Learning Methods -- 10.3 Inverted Pendulum Problem -- 10.4 Experimental Results -- 10.5 Conclusions -- References -- Part VDeep Learning in Feature Vector Processing -- 11 Stock Market Forecasting by Using Support Vector Machines -- 11.1 Introduction -- 11.2 Support Vector Machines -- 11.3 Determinants of Risk and Volatility in Stock Prices -- 11.4 Predictions of Stock Market Movements by Using SVM -- 11.4.1 Data Processing -- 11.4.2 The Proposed SVM Model -- 11.4.3 Feature Selection -- 11.5 Results and Conclusions -- References -- 12 An Experimental Exploration of Machine Deep Learning for Drone Conflict Prediction -- 12.1 Introduction -- 12.1.1 Airspace and Traffic Assumptions -- 12.1.2 Methodological Assumptions -- 12.2 A Brief Introduction to Artificial Neural Networks (ANNs) -- 12.3 Drone Test Scenarios and Traffic Samples -- 12.3.1 Experimental Design -- 12.3.2 ANN Design -- 12.3.3 Procedures -- 12.4 Results -- 12.4.1 Binary Classification Accuracy -- 12.4.2 Classification Sensitivity and Specificity -- 12.4.3 The Extreme Scenario -- 12.4.4 ROC Analysis -- 12.4.5 Summary of Results -- 12.5 Conclusions -- References -- 13 Deep Dense Neural Network for Early Prediction of Failure-Prone Students -- 13.1 Introduction -- 13.2 Literature Review -- 13.3 The Deep Dense Neural Network -- 13.4 Experimental Process and Results -- 13.5 Conclusions -- References -- Part VIEvaluation of Algorithm Performance -- 14 Non-parametric Performance Measurement with Artificial Neural Networks -- 14.1 Introduction -- 14.2 Data Envelopment Analysis -- 14.3 Artificial Neural Networks -- 14.4 Proposed Approach. , 14.4.1 Data Generation-Training and Testing Samples -- 14.4.2 ANN Architecture and Training Algorithm -- 14.5 Results -- 14.6 Conclusion -- References -- 15 A Comprehensive Survey on the Applications of Swarm Intelligence and Bio-Inspired Evolutionary Strategies -- 15.1 Introduction -- 15.2 Nature Inspired Intelligence -- 15.2.1 Swarm Intelligence -- 15.2.2 Algorithms Inspired by Organisms -- 15.3 Application Areas and Open Problems for NII -- 15.3.1 Applications of Swarm Intelligent Methods -- 15.3.2 Applications of Organisms-Inspired Algorithms -- 15.3.3 Comparison and Discussion -- 15.3.4 Are All These Algorithms Actually Needed? -- 15.4 Suggestions and Future Work -- References -- 16 Detecting Magnetic Field Levels Emitted by Tablet Computers via Clustering Algorithms -- 16.1 Introduction -- 16.2 Measurement of the Tablet Magnetic Field -- 16.2.1 Magnetic Field -- 16.2.2 Measuring Devices -- 16.2.3 TCO Standard -- 16.2.4 The Realized Experiment -- 16.2.5 A Typical Way of Working with the Tablet -- 16.3 Magnetic Field Clustering -- 16.3.1 K-Means Clustering -- 16.3.2 K-Medians Clustering -- 16.3.3 Self-Organizing Map Clustering -- 16.3.4 DBSCAN Clustering -- 16.3.5 Expectation-Maximization with Gaussian Mixture Models -- 16.3.6 Hierarchical Clustering -- 16.3.7 Fuzzy-C-Means Clustering -- 16.4 Evaluation of the Tablet User Exposure to ELF Magnetic Field -- 16.5 Results and Discussion -- 16.5.1 Measurement Results -- 16.5.2 Clustering Results -- 16.5.3 The foe Results Measurement -- 16.6 Conclusions -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (185 pages)
    Edition: 1st ed.
    ISBN: 9783319003757
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.25
    DDC: 006.7
    Language: English
    Note: Intro -- Foreword -- Preface -- Contents -- 1 Multimedia Services in Intelligent Environments: Recommendation Services -- Abstract -- 1…Introduction -- 2…Recommendation Services -- 3…Conclusions -- References and Further Readings -- 2 User Modeling in Mobile Learning Environments for Learners with Special Needs -- Abstract -- 1…Introduction -- 2…Overview of a Mobile Educational System for Students with Special Needs -- 2.1 Students with Moving Difficulties -- 2.2 Students with Sight Problems -- 2.3 Dyslexic Students -- 3…Mobile Coordination of People Who Support Children with Special Needs -- 4…Conclusions -- References -- 3 Intelligent Mobile Recommendations for Exhibitions Using Indoor Location Services -- Abstract -- 1…Introduction and Motivation -- 2…Related Experience -- 3…Design and Storyboard -- 4…Architectural Issues -- 4.1 Mobile Devices Subsystem at Visitor Level -- 4.1.1 Operational Specifications of Subsystem of Mobile Devices at Visitor Level -- 4.1.2 Underlying Infrastructure for the Smartphone App: Cell Application -- 4.1.3 Presentation Multimedia Data -- 4.1.4 Instant Messaging Application -- 4.1.5 Positioning Application -- 4.2 Mobile Devices Management and Disposal Subsystem -- 4.2.1 Operational Specifications of Mobile Devices Management and Disposal Subsystem -- 4.2.2 Interaction with Other Subsystems -- 4.2.3 Correct Operation Issues -- 4.3 Networking Services Subsystem -- 4.3.1 Operational Specifications of Networking Services Subsystem -- 4.3.2 Interaction with Other Subsystems -- 4.3.3 Communication Server -- 4.3.4 Monitoring and Management Visitors Administration Console -- 4.4 Data Management System -- 4.5 Wireless Network Infrastructure Subsystem -- 5…Indoor Positioning and Technologies -- 5.1 Microsoft .NET Compact Framework -- 5.2 XMPP Protocol -- 5.3 Openfire -- 5.4 Windows Media Player Mobile. , 5.5 Macromedia Flash Player -- 5.6 Microsoft Visual Studio -- 6…Case Study: The Digital Exhibition of the History of Ancient Olympic Games and Application Visual Evaluation -- 7…Conclusions and Future Steps -- References -- 4 Smart Recommendation Services in Support of Patient Empowerment and Personalized Medicine -- Abstract -- 1…Introduction -- 2…Review and Methods -- 2.1 What Information Constitutes a User Profile? -- 2.2 How Profiling Information is Represented? -- 2.3 How Profiling Information is Obtained? -- 3…Profiling Mechanisms for Patient Empowerment -- 3.1 Challenges and Opportunities -- 3.2 Patient Profiling Server -- 3.3 ALGA-C -- 3.3.1 Quality of Life and Perceived Health State -- 3.3.2 Quality of Life and Psychological Aspects -- 3.3.3 Quality of Life and Psychosocial Aspects -- 3.3.4 Quality of Life and Cognitive Aspects -- 4…p-Medicine Interactive Empowerment Services -- 4.1 p-Medicine Portal -- 4.2 PHR -- 4.3 HDOT Components -- 4.4 Recommendation Service -- 4.5 e-Consent -- 5…Conclusion -- Acknowledgments -- A.x(118). 6…Appendix -- References -- 5 Ontologies and Cooperation of Distributed Heterogeneous Information Systems for Tracking Multiple Chronic Diseases -- Abstract -- 1…Introduction -- 2…Home Telemonitoring for Patients with Chronic Diseases -- 3…Ontology-Based Knowledge Representation -- 3.1 Knowledge Representation Formalisms -- 4…Heterogeneous Medical Knowledge -- 4.1 Techniques for Achieving Semantic Interoperability -- 5…Cooperation of Distributed Heterogeneous Information Systems -- 5.1 Ontologies and Cooperation -- 6…Ontology Construction for Monitoring Patients with Chronic Diseases -- 6.1 Ontology Development Methodologies -- 6.2 Steps for Creating an Ontology -- 6.3 Languages and Tools for Ontologies Reasoning -- 7…Summary -- References -- 6 Interpreting the Omics 'era' Data -- Abstract -- 1…Molecular Structures. , 2…Tree Hierarchies -- 3…Next Generation Sequencing -- 4…Network Biology -- 5…Visualization in Biology---the Present and the Future -- Acknowledgments -- References -- 7 Personalisation Systems for Cultural Tourism -- Abstract -- 1…Introduction -- 2…Personalising City Tours -- 3…Personalising Museum Tours -- 4…Technology -- 5…User Modeling -- 6…Discussion -- References -- Resource List -- 8 Educational Recommender Systems: A Pedagogical-Focused Perspective -- Abstract -- 1…Introduction -- 2…Recommender Systems and Educational Recommender Systems -- 3…Advantages of Introducing Recommender Systems in the Classroom -- 3.1 Student Performance -- 3.2 Social Learning Enhancement -- 3.3 Increased Motivation -- 4…Challenges -- 5…Conclusions -- A.x(118). Appendix A: Selected Resources -- References -- 9 Melody-Based Approaches in Music Retrieval and Recommendation Systems -- Abstract -- 1…Introduction -- 2…Music Similarity and Classification -- 2.1 Train/Test Tasks -- 2.2 Methods and Tools -- 2.3 Audio Tag Classification -- 2.4 Cover Song Classification -- 2.4.1 Methods and Tools -- 2.5 Audio Music Similarity and Retrieval -- 2.5.1 Methods and Tools -- 3…Rhythmical Analysis -- 3.1 Tempo Estimation -- 3.2 Beat Tracking -- 3.2.1 Methods and Tools -- 4…Structural Analysis -- 4.1 Key Detection -- 4.2 Chord Estimation -- 4.3 Audio Melody Extraction -- 4.4 Multiple F_0 Estimation -- 4.4.1 Overlapping Partials -- 4.4.2 Diverse Spectral Characteristics -- 4.4.3 Other Noise Sources -- 4.4.4 Evaluation -- 4.5 Structural Segmentation -- 4.5.1 Methods and Tools -- 5…Query-Based Music Identification -- 5.1 Query by Tapping -- 5.2 Query by Humming (QbH) and Melody Similarity -- 5.2.1 Note-Based Approaches -- 5.2.2 Direct Matching -- 5.2.3 Melody Matching -- 6…Summary -- 7…Resource List -- 7.1 Software -- 7.1.1 Weka -- 7.1.2 Torch -- 7.1.3 Marsyas -- 7.1.4 Praat. , 7.1.5 Audacity -- 7.2 Resources -- 7.2.1 EdaBoard -- 7.2.2 comp.dsp -- 7.2.3 iMIRSEL -- References -- 10 Composition Support of Presentation Slides Based on Transformation of Semantic Relationships into Layout Structure -- Abstract -- 1…Introduction -- 2…Related Work -- 2.1 Authoring Support of Semantic Contents -- 2.2 User Interfaces for Presentation Composition -- 2.3 Automatic Generation of Presentation Slides -- 3…Framework -- 3.1 Process of Presentation Preparation -- 3.2 Representation of Presentation Scenario -- 3.3 Generating Presentation Slides Using Layout Templates -- 4…Composition of Presentation Scenario -- 4.1 Data Structure of Presentation Scenario -- 4.2 Operations for Scenario Composition -- 5…Automatic Generation of Presentation Slides -- 5.1 Processing Flow -- 5.2 Grouping Slide Components -- 5.3 Allocating Slide Components on Slides -- 6…Prototype System -- 6.1 Scenario Composition Interface -- 6.2 Examples of Generated Slides -- 7…Comparison with Existing Systems -- 7.1 Systems Handling Semantic Contents -- 7.2 Systems Supporting Slide Composition -- 8…Conclusion -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (363 pages)
    Edition: 1st ed.
    ISBN: 9783030930523
    Series Statement: Learning and Analytics in Intelligent Systems Series ; v.24
    DDC: 006.3
    Language: English
    Note: Intro -- Foreword -- Preface -- Contents -- 1 Introduction to Advances in Selected Artificial Intelligence Areas -- 1.1 Editorial Note -- 1.2 Book Summary and Future Volumes -- References -- Part I Advances in Artificial Intelligence Paradigms -- 2 Feature Selection: From the Past to the Future -- 2.1 Introduction -- 2.2 The Need for Feature Selection -- 2.3 History of Feature Selection -- 2.4 Feature Selection Techniques -- 2.4.1 Filter Methods -- 2.4.2 Embedded Methods -- 2.4.3 Wrapper Methods -- 2.5 What Next in Feature Selection? -- 2.5.1 Scalability -- 2.5.2 Distributed Feature Selection -- 2.5.3 Ensembles for Feature Selection -- 2.5.4 Visualization and Interpretability -- 2.5.5 Instance-Based Feature Selection -- 2.5.6 Reduced-Precision Feature Selection -- References -- 3 Application of Rough Set-Based Characterisation of Attributes in Feature Selection and Reduction -- 3.1 Introduction -- 3.2 Background and Related Works -- 3.2.1 Estimation of Feature Importance and Feature Selection -- 3.2.2 Rough Sets and Decision Reducts -- 3.2.3 Reduct-Based Feature Characterisation -- 3.2.4 Stylometry as an Application Domain -- 3.2.5 Continuous Versus Nominal Character of Input Features -- 3.3 Setup of Experiments -- 3.3.1 Preparation of Input Data and Datasets -- 3.3.2 Decision Reducts Inferred -- 3.3.3 Rankings of Attributes Based on Reducts -- 3.3.4 Classification Systems Employed -- 3.4 Obtained Results of Feature Reduction -- 3.5 Conclusions -- References -- 4 Advances in Fuzzy Clustering Used in Indicator for Individuality -- 4.1 Introduction -- 4.2 Fuzzy Clustering -- 4.3 Convex Clustering -- 4.4 Indicator of Individuality -- 4.5 Numerical Examples -- 4.6 Conclusions and Future Work -- References -- 5 Pushing the Limits Against the No Free Lunch Theorem: Towards Building General-Purpose (GenP) Classification Systems -- 5.1 Introduction. , 5.2 Multiclassifier/Ensemble Methods -- 5.2.1 Canonical Model of Single Classifier Learning -- 5.2.2 Methods for Building Multiclassifiers -- 5.3 Matrix Representation of the Feature Vector -- 5.4 GenP Systems Based on Deep Learners -- 5.4.1 Deep Learned Features -- 5.4.2 Transfer Learning -- 5.4.3 Multiclassifier System Composed of Different CNN Architectures -- 5.5 Data Augmentation -- 5.6 Dissimilarity Spaces -- 5.7 Conclusion -- References -- 6 Bayesian Networks: Theory and Philosophy -- 6.1 Introduction -- 6.2 Bayesian Networks -- 6.2.1 Bayesian Networks Background -- 6.2.2 Bayesian Networks Defined -- 6.3 Maximizing Entropy for Missing Information -- 6.3.1 Maximum Entropy Formalism -- 6.3.2 Maximum Entropy Method -- 6.3.3 Solving for the Lagrange Multipliers -- 6.3.4 Independence -- 6.3.5 Overview -- 6.4 Philosophical Considerations -- 6.4.1 Thomas Bayes and the Principle of Insufficient Reason -- 6.4.2 Objective Bayesianism -- 6.4.3 Bayesian Networks Versus Artificial Neural Networks -- 6.5 Bayesian Networks in Practice -- References -- Part II Advances in Artificial Intelligence Applications -- 7 Artificial Intelligence in Biometrics: Uncovering Intricacies of Human Body and Mind -- 7.1 Introduction -- 7.2 Background and Literature Review -- 7.2.1 Biometric Systems Overview -- 7.2.2 Classification and Properties of Biometric Traits -- 7.2.3 Unimodal and Multi-modal Biometric Systems -- 7.2.4 Social Behavioral Biometrics and Privacy -- 7.2.5 Deep Learning in Biometrics -- 7.3 Deep Learning in Social Behavioral Biometrics -- 7.3.1 Research Domain Overview of Social Behavioral Biometrics -- 7.3.2 Social Behavioral Biometric Features -- 7.3.3 General Architecture of Social Behavioral Biometrics System -- 7.3.4 Comparison of Rank and Score Level Fusion -- 7.3.5 Deep Learning in Social Behavioral Biometrics -- 7.3.6 Summary and Applications. , 7.4 Deep Learning in Cancelable Biometrics -- 7.4.1 Biometric Privacy and Template Protection -- 7.4.2 Unimodal and Multi-modal Cancelable Biometrics -- 7.4.3 Deep Learning Architectures for Cancelable Multi-modal Biometrics -- 7.4.4 Performance of Cancelable Biometric System -- 7.4.5 Summary and Applications -- 7.5 Applications and Open Problems -- 7.5.1 User Authentication and Anomaly Detection -- 7.5.2 Access Control -- 7.5.3 Robotics -- 7.5.4 Assisted Living -- 7.5.5 Mental Health -- 7.5.6 Education -- 7.6 Summary -- References -- 8 Early Smoke Detection in Outdoor Space: State-of-the-Art, Challenges and Methods -- 8.1 Introduction -- 8.2 Problem Statement and Challenges -- 8.3 Conventional Machine Learning Methods -- 8.4 Deep Learning Methods -- 8.5 Proposed Deep Architecture for Smoke Detection -- 8.6 Datasets -- 8.7 Comparative Experimental Results -- 8.8 Conclusions -- References -- 9 Machine Learning for Identifying Abusive Content in Text Data -- 9.1 Introduction -- 9.2 Abusive Content on Social Media and Their Identification -- 9.3 Identification of Abusive Content with Classic Machine Learning Methods -- 9.3.1 Use of Word Embedding in Data Representation -- 9.3.2 Ensemble Model -- 9.4 Identification of Abusive Content with Deep Learning Models -- 9.4.1 Taxonomy of Deep Learning Models -- 9.4.2 Natural Language Processing with Advanced Deep Learning Models -- 9.5 Applications -- 9.6 Future Direction -- 9.7 Conclusion -- References -- 10 Toward Artifical Intelligence Tools for Solving the Real World Problems: Effective Hybrid Genetic Algorithms Proposal -- 10.1 Introduction -- 10.2 University Course Timetabling UCT -- 10.2.1 Problem Statement and Preliminary Definitions -- 10.2.2 Related Works -- 10.2.3 Problem Modelization and Mathematical Formulation -- 10.2.4 An Interactive Decision Support System (IDSS) for the UCT Problem. , 10.2.5 Empirical Testing -- 10.2.6 Evaluation and Results -- 10.3 Solid Waste Management Problem -- 10.3.1 Related Works -- 10.3.2 The Mathematical Formulation Model -- 10.3.3 A Genetic Algorithm Proposal for the SWM -- 10.3.4 Experimental Study and Results -- 10.4 Conclusion -- References -- 11 Artificial Neural Networks for Precision Medicine in Cancer Detection -- 11.1 Introduction -- 11.2 The fLogSLFN Model -- 11.3 Parallel Versus Cascaded LogSLFN -- 11.4 Adaptive SLFN -- 11.5 Statistical Assessment -- 11.6 Conclusions -- References -- Part III Recent Trends in Artificial Intelligence Areas and Applications -- 12 Towards the Joint Use of Symbolic and Connectionist Approaches for Explainable Artificial Intelligence -- 12.1 Introduction -- 12.2 Literature Review -- 12.2.1 The Explainable Interface -- 12.2.2 The Explainable Model -- 12.3 New Approaches to Explainability -- 12.3.1 Towards a Formal Definition of Explainability -- 12.3.2 Using Ontologies to Design the Deep Architecture -- 12.3.3 Coupling DNN and Learning Classifier Systems -- 12.4 Conclusions -- References -- 13 Linguistic Intelligence As a Root for Computing Reasoning -- 13.1 Introduction -- 13.2 Language as a Tool for Communication -- 13.2.1 MLW -- 13.2.2 Sounds and Utterances Behavior -- 13.2.3 Semantics and Self-expansion -- 13.2.4 Semantic Drifted Off from Verbal Behavior -- 13.2.5 Semantics and Augmented Reality -- 13.3 Language in the Learning Process -- 13.3.1 Modeling Learning Profiles -- 13.3.2 Looking for Additional Teaching Tools in Academy -- 13.3.3 LEARNITRON for Learning Profiles -- 13.3.4 Profiling the Learning Process: Tracking Mouse and Keyboard -- 13.3.5 Profiling the Learning Process: Tracking Eyes -- 13.3.6 STEAM Metrics -- 13.4 Language of Consciousness to Understand Environments -- 13.4.1 COFRAM Framework -- 13.4.2 Bacteria Infecting the Consciousness. , 13.5 Harmonics Systems: A Mimic of Acoustic Language -- 13.5.1 HS for Traffic's Risk Predictions -- 13.5.2 HS Application to Precision Farming -- 13.6 Conclusions and Future Work -- References -- 14 Collaboration in the Machine Age: Trustworthy Human-AI Collaboration -- 14.1 Introduction -- 14.2 Artificial Intelligence: An Overview -- 14.2.1 The Role of AI-Definitions and a Short Historic Overview -- 14.2.2 AI and Agents -- 14.2.3 Beyond Modern AI -- 14.3 The Role of AI for Collaboration -- 14.3.1 Human-Computer Collaboration Where AI is Embedded -- 14.3.2 Human-AI Collaboration (Or Conversational AI) -- 14.3.3 Human-Human Collaboration Where AI Can Intervene -- 14.3.4 Challenges of Using AI: Toward a Trustworthy AI -- 14.4 Conclusion -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Self-help devices for people with disabilities. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (317 pages)
    Edition: 1st ed.
    ISBN: 9783030871321
    Series Statement: Learning and Analytics in Intelligent Systems Series ; v.28
    DDC: 681.761
    Language: English
    Note: Intro -- Foreword -- Preface -- Contents -- 1 Introduction to Advances in Assistive Technologies -- 1.1 Editorial Note -- 1.2 Book Summary and Future Volumes -- References -- Part I Advances in Assistive Technologies in Healthcare -- 2 Applications of AI in Healthcare and Assistive Technologies -- 2.1 Introduction -- 2.2 Healthcare and Biomedical Research -- 2.2.1 Controlled Monitoring Environment -- 2.2.2 Evolving Healthcare Techniques -- 2.2.3 Diagnosis -- 2.3 Assistive Technologies -- 2.3.1 Smart Homes and Cities -- 2.3.2 Assistive Robotics -- 2.4 Analysis and Forecasting -- 2.5 Conclusions -- References -- 3 A Research Agenda for Dementia Care: Prevention, Risk Mitigation and Personalized Interventions -- 3.1 Introduction -- 3.2 Mild Behavioral Impairments (MBI) and Dementia -- 3.3 Biometric Data -- 3.4 Caring for Caregivers -- 3.5 Tests -- 3.6 Conclusions -- References -- 4 Machine Learning and Finite Element Methods in Modeling of COVID-19 Spread -- 4.1 Introduction -- 4.1.1 Physiology of Human Respiratory System -- 4.1.2 Spreading of SARS-CoV-2 Virus Infection -- 4.1.3 Machine Learning for SARS-CoV-2 -- 4.2 Methods -- 4.2.1 Finite Element Method for Airways and Lobes -- 4.2.2 Machine Learning Method -- 4.3 Results -- 4.3.1 Simulation of Virus Spreading by Finite Element Analysis -- 4.3.2 Machine Learning Results -- 4.4 Conclusions -- References -- Part II Advances in Assistive Technologies in Medical Diagnosis -- 5 Towards Personalized Nutrition Applications with Nutritional Biomarkers and Machine Learning -- 5.1 Introduction -- 5.1.1 Summary -- 5.1.2 Chapter Synopsis -- 5.1.3 Goals and Perspective -- 5.2 Basic Concepts -- 5.2.1 Personalized Medicine -- 5.2.2 Next Generation Sequencing -- 5.2.3 Obesity -- 5.2.4 Nutritional Biomarkers -- 5.3 Neural Networks, Pattern Recognition and Datasets -- 5.3.1 Neural Network. , 5.3.2 Implementation Environment -- 5.3.3 Proposed System -- 5.4 Implementation and Evaluation of the Proposed System -- 5.4.1 Deep Back Propagation Neural Network -- 5.4.2 Standard Biochemistry Profile Neural Network (SBPNN) -- 5.4.3 Neural Network Dietary Profile -- 5.5 Conclusions and Future Research -- 5.5.1 Prevention -- 5.5.2 Modelling -- 5.5.3 Automation -- 5.5.4 Perspective -- 5.5.5 Discussion on Feature Research -- 5.6 Appendix -- References -- 6 Inductive Machine Learning and Feature Selection for Knowledge Extraction from Medical Data: Detection of Breast Lesions in MRI -- 6.1 Introduction -- 6.2 Detailed Literature Review -- 6.3 Presentation of the Data -- 6.3.1 Data Collection -- 6.3.2 Description of Variables -- 6.3.3 Dataset Preprocessing -- 6.4 Methodology -- 6.4.1 Modeling Methodology -- 6.4.2 Feature Selection Process -- 6.4.3 Classification Method -- 6.4.4 Validation Process -- 6.5 Modeling Approaches -- 6.5.1 Experimental Process -- 6.5.2 Experimental Results -- 6.6 Conclusions and Further Search -- Annex 6.1-Abbreviations -- Annex 6.2-Variables Frequency Charts (Original Dataset) -- Annex 6.3-Variables' Values Range -- Annex 6.4-Classification Tree (Benign or Malignant) -- References -- 7 Learning Paradigms for Neural Networks for Automated Medical Diagnosis -- 7.1 Introduction -- 7.2 Classical Artificial Neural Networks -- 7.3 Learning Paradigms -- 7.3.1 Evolutionary Computation Learning Paradigm -- 7.3.2 Bayesian Learning Paradigm -- 7.3.3 Markovian Stimulus-Sampling Learning Paradigm -- 7.3.4 Logistic Regression Paradigm -- 7.3.5 Ant Colony Optimization Learning Paradigm -- 7.4 Conclusions and Future Outlook -- References -- Part III Advances in Assistive Technologies in Mobility and Navigation -- 8 Smart Shoes for Assisting People: A Short Survey -- 8.1 Smart Shoes for People in Need. , 8.1.1 Smart Shoes for Visually Impaired People [6] -- 8.1.2 Smart Shoes for Blind Individuals [13] -- 8.1.3 IoT Based Wireless Smart Shoes and Energy Harvesting System [7] -- 8.1.4 Smart Shoes for Sensing Force [8] -- 8.1.5 Smart Shoes for Temperature and Pressure [9] -- 8.1.6 Smart Shoes in IoT [10] -- 8.1.7 Smart Shoes for People with Walking Disorders [23] -- 8.2 Special Purpose Smart Shoes -- 8.2.1 Smart Shoes with Triboelectric Nanogenerator [11] -- 8.2.2 Smart Shoes Gait Analysis [12] -- 8.2.3 Smart Shoes for Biomechanical Energy Harvesting [14] -- 8.2.4 Smart Shoes with Embedded Piezoelectric Energy Harvesting [15] -- 8.2.5 Pedestrian Navigation Using Smart Shoes with Markers [16] -- 8.2.6 Smart Shoes with 3D Tracking Capabilities [17] -- 8.2.7 Pedestrian's Safety with Smart Shoes Sensing [18] -- 8.2.8 Smart Shoes Insole Tech for Injury Prevention [19] -- 8.3 Maturity Evaluation of the Smart Shoes -- 8.4 Conclusion -- References -- 9 Re-Examining the Optimal Routing Problem from the Perspective of Mobility Impaired Individuals -- 9.1 Introduction -- 9.2 Literature Review -- 9.2.1 Mobility Aspects for People with Special Needs -- 9.3 Related Work -- 9.3.1 Miller-Tucker-Zemlin Formulation of the Traveling Salesman Problem -- 9.3.2 Dantzig-Fulkerson-Johnson Formulation of the Traveling Salesman Problem -- 9.4 The Optimal Routing Problem from the Perspective of Mobility Impaired Individuals -- 9.4.1 Measuring Route Scores Based on the Degree of Accessibility -- 9.4.2 Problem Statement: The Optimal Routing Problem from the Perspective of Mobility Impaired Individuals -- 9.4.3 The Proposed Solution Approach -- 9.5 The Experimental Results and Discussion -- 9.6 Conclusions -- References -- 10 Human Fall Detection in Depth-Videos Using Temporal Templates and Convolutional Neural Networks -- 10.1 Introduction -- 10.2 Proposed Method. , 10.3 Experiments, Results and Discussion -- 10.3.1 SDU Fall Dataset -- 10.3.2 UP-Fall Detection Dataset -- 10.3.3 UR Fall Detection Dataset -- 10.3.4 MIVIA Action Dataset -- 10.4 Conclusions and Future Work -- 10.5 Compliance with Ethical Standards -- References -- 11 Challenges in Assistive Living Based on Tech Synergies: The Cooperation of a Wheelchair and A Wearable Device -- 11.1 Overall Description of the Challenges -- 11.2 Background and Significance -- 11.3 The Associated Research Challenges -- 11.3.1 Main Innovative Tasks -- 11.4 Discussion -- References -- 12 Human-Machine Requirements' Convergence for the Design of Assistive Navigation Software: Τhe Case of Blind or Visually Impaired People -- 12.1 Introduction -- 12.2 Related Work -- 12.3 Methodology -- 12.3.1 Interviews with BVI People and Requirements Classification -- 12.3.2 Description of the Participants -- 12.3.3 Requirements Classification -- 12.4 Analysis of the Elicited Requirements -- 12.4.1 Elicited Requirements of the BVI -- 12.5 Discussion -- 12.6 Conclusion -- Appendix A -- References -- Part IV Advances in Privacy and Explainability in Assistive Technologies -- 13 Privacy-Preserving Mechanisms with Explainability in Assistive AI Technologies -- 13.1 Introduction -- 13.1.1 Data Ethics -- 13.1.2 Data Privacy -- 13.1.3 Data Security -- 13.2 AI Applications in Assistive Technologies -- 13.2.1 Explainable AI (XAI) -- 13.3 Data Privacy and Ethical Challenges for Assistive Technologies -- 13.3.1 Data Collection and Data Sharing -- 13.3.2 Secure and Responsible Data Sharing Framework -- 13.4 AI Assistive Technologies with Privacy Enhancing -- 13.4.1 Privacy-Preserving Mechanisms for AI Assistive Technologies -- 13.5 Discussions -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Interactive multimedia. ; Computational intelligence. ; Multimedia systems. ; Computer software -- Development. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (178 pages)
    Edition: 1st ed.
    ISBN: 9783319003726
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.24
    DDC: 006.7
    Language: English
    Note: Intro -- Foreword -- Preface -- Contents -- 1 Multimedia Services in Intelligent Environments: Advances in Recommender Systems -- Abstract -- 1…Introduction -- 2…Recommender Systems -- 3…Conclusions -- References -- 2 A Survey of Approaches to Designing Recommender Systems -- Abstract -- 1…Introduction to Recommender Systems -- 1.1 Formulation of the Recommendation Problem -- 1.1.1 The Input to a Recommender System -- 1.1.2 The Output of a Recommender System -- 1.2 Methods of Collecting Knowledge About User Preferences -- 1.2.1 The Implicit Approach -- 1.2.2 The Explicit Approach -- 1.2.3 The Mixing Approach -- 2…Summarization of Approaches to Recommendation -- 2.1 Content-Based Methods -- 2.2 Collaborative Methods -- 2.2.1 User-Based Collaborative Filtering Systems -- 2.2.2 Item-Based Collaborative Filtering Systems -- 2.2.3 Personality Diagnosis -- 2.3 Hybrid Methods -- 2.3.1 Adding Content-Based Characteristics to Collaborative Models -- 2.3.2 Adding Collaborative Characteristics to Content-Based Models -- 2.3.3 A Single Unifying Recommendation Model -- 2.3.4 Other Types of Recommender Systems -- 2.4 Fundamental Problems of Recommender Systems -- References -- 3 Hybrid User Model for Capturing a User's Information Seeking Intent -- Abstract -- 1…Introduction -- 2…Related Work -- 2.1 Methodologies for Building a User Model for Information Retrieval -- 2.2 Decision Theory for Information Retrieval -- 3…Capturing a User's Intent in an Information Seeking Task -- 3.1 Overview -- 3.2 Interest Set -- 3.3 Context Network -- 3.4 Preference Network -- 4…Hybrid User Model -- 4.1 Overview -- 4.2 Sub-Value Function Over Query -- 4.3 Sub-Value Function for Threshold -- 4.4 Complexity of Hybrid User Model -- 4.4.1 Implementation -- 5…Evaluation -- 5.1 Objectives -- 5.2 Testbeds -- 5.3 Vector Space Model and Ide dec-hi -- 5.4 Procedures. , 5.5 Traditional Procedure -- 5.6 Procedure to Assess Long-Term Effect -- 6…Results and Discussion -- 6.1 Results of Traditional Procedure -- 6.2 Results of New Procedure to Assess Long-Term Effect -- 7…Discussion -- 8…Application of Hybrid User Model -- 9…Conclusions and Future Work -- References -- 4 Recommender Systems: Network Approaches -- Abstract -- 1…Introduction -- 2…Recommender Systems Review -- 3…Background: Graphs and NoSQL -- 3.1 Current NoSQL Implementations -- 3.2 The Algebraic Connectivity Metric -- 3.3 Recommendation Comparison and Propagation -- 4…The Effect of Algebraic Connectivity on Recommendations -- 4.1 Application to Improve Recommendations -- 5…Recommendations Experiment and Results -- 6…Conclusion -- References -- Resource List -- 5 Toward the Next Generation of Recommender Systems: Applications and Research Challenges -- Abstract -- 1…Introduction -- 2…Recommender Systems in Software Engineering -- 3…Recommender Systems in Data and Knowledge Engineering -- 4…Recommender Systems for Configurable Items -- 5…Recommender Systems for Persuasive Technologies -- 6…Further Applications -- 7…Issues for Future Research -- 8…Conclusions -- References -- 6 Content-Based Recommendation for Stacked-Graph Navigation -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Stacked Graphs -- 3.1 Views and View Properties -- 4…Content-Based Recommendation -- 4.1 View Data Set -- 4.2 User Profile -- 4.2.1 Inferring Preferences for Seen Views -- 4.2.2 Inferring Preferences for Attributes of Seen Views -- 4.3 Content-Based Recommendation -- 4.4 Usage Scenario -- 5…User Study -- 6…Results and Discussions -- 7…Conclusion and Future Work -- References -- 7 Pattern Extraction from Graphs and Beyond -- Abstract -- 1…Introduction -- 2…Foundations -- 2.1 Graphs -- 2.2 Graph Representations -- 2.3 Basic Notions of Graph Components -- 3…Explicit Models. , 3.1 Tree -- 3.2 Cohesive Subgraphs -- 3.3 Cliques -- 4…Implicit Models -- 4.1 Modularity and Its Approximation -- 4.2 Network Flow -- 5…Beyond Static Patterns -- 5.1 Sequential Pattern Mining in Data Stream -- 5.2 Explicit Approaches for Tracing Communities -- 5.3 Implicit Approaches for Tracing Communities -- 6…Conclusion -- References -- Source List -- 8 Dominant AHP as Measuring Method of Service Values -- Abstract -- 1…Introduction -- 2…Necessity of Measuring Service Values -- 2.1 Significance of Service Science -- 2.2 Scientific Approach to Service Science -- 3…AHP as a Measuring Method of Service Values -- 3.1 Saaty's AHP -- 3.2 Dominant AHP -- 4…AHP and Dominant AHP from a Perspective of Utility Function -- 4.1 Expressive form of Multi-Attribute Utility Function -- 4.2 Saaty's AHP from a perspective of utility function -- 4.3 Dominant AHP from a viewpoint of utility function -- 5…Conclusion -- 9 Applications of a Stochastic Model in Supporting Intelligent Multimedia Systems and Educational Processes -- Abstract -- 1…Introduction -- 2…Formulating a Minimum of a Random Number of Nonnegative Random Variables -- 3…Distribution Function of the Formulated Minimum -- 4…Applications in Systems and Processes -- 5…Conclusions -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...